JOIN US IN BANGKOK ON January 21-24 | #CPX360

CPX 360

THE PREMIER CYBER SECURITY SUMMIT AND EXPO
{d&lt}
{dn}

{dl}

{d>}{h&lt}
{hn}

{hl}

{h>}{m&lt}
{mn}

{ml}

{m>}{s&lt}
{sn}

{sl}

{s>}

CPX 360 promises to be the premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber security elite. If you attend one cyber security event this year, make it CPX 360.

 

Tracks at a Glance

Cyber Talk Keynotes – Experience TED-like sessions bringing together top cyber security experts to identify ways to tackle unprecedented security challenges and discuss cyber security priorities, trends and innovations
Securing your Cloud (NEW) – All about securing your cloud with effective blueprints to SaaS, Public and Private Cloud
Hackers Exposed (NEW) – Learn how hackers are developing the next wave of Gen VI threats
Cyber Security Innovations (NEW) – Explore Cyber Security Innovations to effectively prevent threats before they cause damage
Cyber Innovation Competition (NEW) – 20×20 short cyber innovation stories
CheckMates Community use-cases – Listen first-hand to industry best practices from other organizations discussing real use-cases
Technology Innovation Labs – Experience Infinity threat prevention and security architecture
Geek Village (NEW) – geeky workshops (e.g. malware reversing, lock picking, crypto, Lego models etc.)
Hands-On Labs – Test Drive our latest technology through our hands-on Lab with a step by step cookbooks
EXPO – Explore the EXPO; see the latest technology solutions and demonstrations from Check Point and our Partners, Start-Up Pavilion
Gamification – Explore the 2019 Cyber challenge – CTF game, Shoot down hackers in the Cyber Range, or go on the CheckMates Scavenger Hunt
Cyber Range – Shoot down hackers and compete for the crown in our Expo Cyber Range. Sign up now to secure your place!

Speakers

Kenny Tan

GM at Alibaba Cloud Malaysia

Kenny’s recent projects include developing strategic ecosystems, enhancing cloud and security solutions for businesses and bringing innovative big data and machine learning technologies to local enterprises.

    Ramandeep Singh Walia

    CEO, QOS Technology

    Ramandeep is currently the CEO of QOS Technology, a cyber security Products and Services company and a Check Point 4-Star Partner.

      Tim Hall

      Founder, Shadow Peak Inc

      Tim has been providing security consulting services for organizations along the Colorado Front Range full time since 1999.

        Nicky Fang

        Solutions Architect, Arctic Security Oy

        Nicky has been a security advocate and strategist with strong technical background spanning across various systems and security technologies, cyber security solutions and services in his career.

          Indrajeet Bhuyan

          Security Researcher, Techlomedia

          Indrajeet made the smallest possible code which could crash WhatsApp which effected 500 million people and also reported security holes in the WhatsApp that exposes its users’ privacy.

            Gil Shwed

            Founder and CEO

            Gil Shwed is the founder and Chief Executive Officer. Mr. Shwed is considered the inventor of the modern firewall and authored several patents, such as the company’s Stateful Inspection technology.

              Dorit Dor

              Vice President of Products

              Dr. Dorit Dor, Vice President of products at Check Point, manages all product definition and development functions for both the enterprise and consumer divisions of the company

                Peter Alexander

                Chief Marketing Officer

                As CMO, Peter leads Check Point’s Marketing Organization, including Corporate Marketing, Corporate Communications, GEO/Field Marketing, Strategic Marketing, and Demand Generation.

                  Sponsors

                  Platinum Sponsors

                  Gold Sponsors

                  Silver Sponsors

                  Bronze Sponsors

                  Start-up Sponsors

                  Schedule

                  18:00 - 21:00
                  Registration and Welcome Cocktail Reception

                  Registration and Welcome Cocktail Reception (All Field, Partners & Customers) – EXPO Opens + R&D Ask me Anything + 20x20 Cyber Innovation Competition + Cyber Range Competition

                  9:00 - 13:00
                  Training Tracks

                  1. Cyber Range
                    • Hyper-realistic simulation and virtual training environment, providing Gen V cyber range training for all type of customers and partners
                  2. Be a technical expert on the Check Point R80.20 software release
                    • Learn what’s new with R80.20 NGFW/NGTP. Employ the new security policy layers functionality.

                  Technology Innovation Labs
                  1. SandBlast Network + Web Threat Extraction
                  2. Securing End Points with SandBlast Agent
                  3. Mobile Security 3.0
                  4. CloudGuard & Dome9
                  5. Securing Clouds with CloudGuard SaaS
                  6. Container Security with CloudGuard IaaS (Private)
                  7. Securing Public Clouds
                  8. SD-WAN Security
                  9. Latest Innovation with ThreatGuard
                  10. SecaaS, TELCO & Virtualization and DevOps
                  11. ICS + SCADA Security
                  12. Latest on Security Management - R80.20
                  13. DEVOPS - Automation & Orchestration - R80.20
                  14. Device operations-simplified!
                  15. MAESTRO - Scalable platform - Demo!
                  16. SMB Security
                  17. R80.20 Best practices - Use cases
                  18. Automatic Tailored Threat Prevention
                  19. Check Point Infinity - Multi vector security
                  20. End Point Cloud Management & Operations
                  21. HLS & SandBlast Now
                  22. Threat Hunting
                  23. SandBlast Agent for MAC
                  24. Securing the future - Sandblast for Educational
                  25. Security management on the Cloud

                  9:10 - 10:30
                  Cyber Talk Keynotes

                  1) Welcome
                  2) Gil Shwed Keynote – Cyber Security for 2020 – Gil Shwed, Founder & CEO
                  3) A Cyber Security Gut Check: Good is Not Good Enough – Avi Rembaum, VP, Security Solutions
                  4) Microsoft Azure Keynote – Joran Borenstein, GM Cybersecurity, Group Microsoft
                  5) Alibaba Keynote - Kenny Tan, GM, Alibaba Cloud

                  1) How Do We Protect Our Own Cloud Infrastructure? – Sharon Schusheim, VP, Information Systems
                  2) AI Innovations in Cyber Security – Neatsun, VP, Threat Prevention + Eddie Doyle, Cyber Security Evangelist
                  3) Incident Response Cloud War Stories – Dan Wiley, Head of Incident Response
                  4) Age of Things – Gen VI Security – Itai Greenberg, VP, Product Manager + Oded Gonda, VP, Technology & Innovation

                  12:00 - 18:00
                  Expo

                  Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                  Securing your Cloud
                  13:30 - 14:00 -- 1) Kick-*aas Cloud Security: Architecting Robust Security and Compliance Across Your *-as-a- Service Footprint – Zohar Alon
                  14:00 - 14:30 -- 2) Securing SaaS Applications – The Pragmatic Approach – Assaf Henig
                  15:00 - 15:30 -- 3) Who’s Responsible for Your Cloud Security? – Lessons Learned – Ran Nahmias + Richard Cove
                  15:30 - 16:00 -- 4) Lift & Shift vs. Cloud Native – Yariv Fishman

                  Cyber Security Innovations
                  13:30 - 14:00 -- 1) Preventing Attacks on Mobile Devices – Jeremy Kaye + Ran Schwartz
                  14:00 - 14:30 -- 2) Security at Hyper-Scale – Michael Greenberg
                  15:00 - 15:30 -- 3) Humans are your weakest link. Protecting against social engineering with Infinity – Eytan Segal + Eitan Erez
                  15:30 - 16:00 -- 4) SD-WAN and Branch Office Security – Unique Challenges & Effective Approaches – Aviv Abramovich

                  Security Automation & Orchestration
                  13:30 - 14:00 -- 1) AWS Session - Saroj Punyapatthanakul – Chief Security Architect AWS
                  14:00 - 14:30 -- 2) Finding the Breach in a Haystack – Live Demo – Oren Koren
                  15:00 - 15:30 -- 3) SMB Security – Unique Challenges & Effective Approaches – Aviv Abramovich
                  15:30 - 16:00 -- 4) Orchestrating Gateway Operations – Best Practices – Valeri Loukine

                  Hackers Exposed
                  13:30 - 14:00 -- 1) The Next Wave of Breaches Dissected – Orli Gan
                  14:00 - 14:30 -- 2) Domestic Kitten Unravelling ISIS Espionage – Lotem Finchelstein
                  15:00 - 15:30 -- 3) What the fax? – Yaniv Balmas
                  15:30 - 16:00 -- 4) Hacking Drones & Spreading Fake News via WhatsApp – Roman Zaikin

                  CheckMates Community Use-Cases
                  13:30 - 14:00 -- 1) Geo Policy - Your Secret Weapon for Increased Security and Gateway Performance-Timothy Hall- Founder, Shadow Peak Inc
                  14:00 - 14:30 -- 2) Automate Everything – The Future of Security Automation – Tomer Sole, Check Point
                  15:00 - 15:30 -- 3) Communicating the value of cloud and security to the business-Aaron McKeown, Head of Security Engineering, Xero
                  15:30 - 16:00 -- 4) How to Prevent Attacks Before They Strike – Lior Drihem, Meir Jonathan-Dahan + Elad Goldenberg

                  Technology Innovation Labs
                  1. SandBlast Network + Web Threat Extraction
                  2. Securing End Points with SandBlast Agent
                  3. Mobile Security 3.0
                  4. CloudGuard & Dome9
                  5. Securing Clouds with CloudGuard SaaS
                  6. Container Security with CloudGuard IaaS (Private)
                  7. Securing Public Clouds
                  8. SD-WAN Security
                  9. Latest Innovation with ThreatGuard
                  10. SecaaS, TELCO & Virtualization and DevOps
                  11. ICS + SCADA Security
                  12. Latest on Security Management - R80.20
                  13. DEVOPS - Automation & Orchestration - R80.20
                  14. Device operations-simplified!
                  15. MAESTRO - Scalable platform - Demo!
                  16. SMB Security
                  17. R80.20 Best practices - Use cases
                  18. Automatic Tailored Threat Prevention
                  19. Check Point Infinity - Multi vector security
                  20. End Point Cloud Management & Operations
                  21. HLS & SandBlast Now
                  22. Threat Hunting
                  23. SandBlast Agent for MAC
                  24. Securing the future - Sandblast for Educational
                  25. Security management on the Cloud

                  Hands-on Labs
                  1. New R80.20 SmartEvent
                  2. SandBlat Network + Agent
                  3. Public Cloud (AWS, Azure) + Dome9
                  4. Private Cloud (Cisco ACI, Vmware NSX)
                  5. Check Point Infinity
                  6. Security Management & Automation R820.10 - DevOps

                  9:05 - 10:25
                  Cyber Talk Keynotes

                  1) Check Point 2019 Innovations, Roadmap & Vision – Dorit Dor, VP, Products
                  2) IoT and Nano Security Unraveled – Yariv Fishman, Head of Product Management, Cloud Security
                  3) Cyber Risk Paradox – Tony Jarvis, Threat Prevention Architect, AMA

                  1) CloudGuard Dome9 and Check Point’s CloudGuard Family – Zohar Alon, Head of Cloud Product Line
                  2) Hackers Exposed – Gen VI Threats Under the Microscope – Yaniv Balmas, Head of Security Research
                  3) Hacking like a Disney Villain– Actionable Threat Intelligence – Maya Horowitz, Director, Threat Intelligence & Research
                  4) Cloudy with a Chance of a Breach – Gary Gardiner, Head of Security Engineering, AMA

                  12:00 - 16:00
                  Expo

                  Explore the latest solutions with live demonstrations by Check Point and our partners + 20x20 Cyber Innovation Competition + Cyber Range Competition

                  Securing your Cloud
                  13:30 - 14:00 -- 1) AWS & Azure IaaS Architecture Blueprint – Amit Schnitzer
                  14:00 - 14:30 -- 2) Dockers & Containers: How to Contain it Securely – Amir Kaushansky
                  15:00 - 15:30 -- 3) SEE SPOT SECURE - Continuous Cloud Compliance and Security Simplified with Dome9 – Grant Asplund
                  15:30 - 16:00 -- 4) Kick-‘aas Cloud Security: Architecting Robust Security and Compliance Across Your ‘as-a-Service Footprint – Zohar Alon

                  Cyber Security Innovations
                  13:30 - 14:00 -- 1) The frontier beyond your company’s perimeter – Protecting devices, securing data – Tal Eisner
                  14:00 - 14:30 -- 2) Threat Hunting with SandBlast NOW – Nir Naaman, Head of Government and Defense Products
                  15:00 - 15:30 -- 3) Endpoint Security Total Protection - Best Practices – Lior Arzi
                  15:30 - 16:00 -- 4) Preventing Attacks on Mobile Devices – Jeremy Kaye + Ran Schwartz

                  Security Automation & Orchestration
                  13:30 - 14:00 -- 1) Automate Everything – The Future of Security Automation – Tomer Sole
                  14:00 - 14:30 -- 2) Security for DevOps – No Humans Necessary – Donald Wasylyna
                  15:00 - 15:30 -- 3) How to Prevent Attacks Before They Strike – Lior Drihem, Meir Jonathan-Dayan + Elad Goldenberg
                  15:30 - 16:00 -- 4) API Best Practices with Check Point – Tomer Sole

                  Hackers Exposed
                  13:30 - 14:00 -- 1) PS I See You: PowerShell and Fileless Attacks Hidden in Your Environments- Pasha Pal Group Manager
                  14:00 - 14:30 -- 2) Turning the Enemy against himself – Raman Ladutska
                  15:00 - 15:30 -- 3) MeeCukoo – Bypassing Sandboxes – Aliaksandr Chailytko
                  15:30 - 16:00 -- 4) Olympic Destroyer – The Games of Malware – Michael Abramzon

                  CheckMates Community Use-Cases
                  13:30 - 14:00 -- 1) Organized Syndicates, the Defenders Way-Nicky Fang, Solutions Architect, APAC, Arctic Security Ltd
                  14:00 - 14:30 -- 2) Orchestrating Gateway Operations – Best Practices – Valeri Loukine, Cyber Security Evangelist, Check Point
                  15:00 - 15:30 -- 3) Cyber Security for Smart Manufacturing and Industry 4.0-Ramandeep Singh Walia, CEO, QOS Technology
                  15:30 - 16:00 -- 4) Finding the Breach in a Haystack – Live Demo – Oren Koren, Check Point

                  Technology Innovation Labs
                  1. SandBlast Network + Web Threat Extraction
                  2. Securing End Points with SandBlast Agent
                  3. Mobile Security 3.0
                  4. CloudGuard & Dome9
                  5. Securing Clouds with CloudGuard SaaS
                  6. Container Security with CloudGuard IaaS (Private)
                  7. Securing Public Clouds
                  8. SD-WAN Security
                  9. Latest Innovation with ThreatGuard
                  10. SecaaS, TELCO & Virtualization and DevOps
                  11. ICS + SCADA Security
                  12. Latest on Security Management - R80.20
                  13. DEVOPS - Automation & Orchestration - R80.20
                  14. Device operations-simplified!
                  15. MAESTRO - Scalable platform - Demo!
                  16. SMB Security
                  17. R80.20 Best practices - Use cases
                  18. Automatic Tailored Threat Prevention
                  19. Check Point Infinity - Multi vector security
                  20. End Point Cloud Management & Operations
                  21. HLS & SandBlast Now
                  22. Threat Hunting
                  23. SandBlast Agent for MAC
                  24. Securing the future - Sandblast for Educational
                  25. Security management on the Cloud

                  Hands-on Labs
                  1. New R80.20 SmartEvent
                  2. SandBlat Network + Agent
                  3. Public Cloud (AWS, Azure) + Dome9
                  4. Private Cloud (Cisco ACI, Vmware NSX)
                  5. Check Point Infinity
                  6. Security Management & Automation R820.10 - DevOps

                  9:00 - 12:00
                  Sessions for Partners

                  1) Welcome
                  2) Partnering for Success! - Dan Yerushalmi, Chief Customer Officer +Frank Rauch, Head of Worldwide Channel
                  3) Taking the gloves off in 2019 - Peter Alexander, Chief Marketing Officer
                  4) Partner Awards
                  5) Coffee Break and Networking
                  6) Winning Through Innovation - Moti Sagey, Head of Strategic Marketing & Intelligence
                  7) Leveraging Emerging Products to Over Achieve Your Quota – Nathan Shuchami, VP, Emerging Products

                  13:00 - 16:10
                  Breakouts: Sales and Technical

                  Sales A
                  1) Understanding the Infinity Total Protection Value Preposition - Eran Orzel, Head of Strategic Sales and Partnerships
                  2) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                  3) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security
                  4) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community


                  Sales B
                  1) Replicating Success with Customer Win Cases - Amit Sharon, Head of Customer Community
                  2) Understanding the Infinity Total Protection Value Preposition - Eran Orzel, Head of Strategic Sales and Partnerships
                  3) New Customers - Leveraging Partner Program - Yifat Bavli, Sales Enablement Manager + Aviel Katz, Head of Partner Alliance
                  4) How to Sell CloudGuard with Customer Centric Approach - Yariv Fishman, Head of Product Management, Cloud Security


                  SE 1
                  1) How to Whiteboard the Gen V Story - Gary Gardiner, Head of Security Engineering, AMA
                  2) How to Win EVERY POC! - Asher Harosh, Group Manager
                  3) Maximize the Value of Technical Sales Tools - Hanan Adika, Director, Global Solution Center
                  4) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence

                  SE 2
                  1) Dive Deep into Competitive Analysis - Hezi Chen, Head of Competitive Intelligence
                  2) How to Whiteboard the Gen V Story - Gary Gardiner, Head of Security Engineering, AMA
                  3) How to Win EVERY POC! - Asher Harosh, Group Manager
                  4) Maximize the Value of Technical Sales Tools - Hanan Adika, Director, Global Solution Center

                  Pricing

                  Customers
                  $1490
                  • Two Day Event
                  • All General Sessions
                  • All Breakout Sessions
                  • CPX Expo Pass
                  • Welcome Reception
                  • Training with additional cost
                  Register
                  Partners
                  $1590
                  • Three Day Event
                  • All General Sessions
                  • All Breakout Sessions
                  • CPX Expo Pass
                  • Welcome Reception
                  • Training with additional cost
                  Register

                  FAQ

                  Registration

                  Who should attend?

                  CPX 360 delivers several conference tracks of vital interest for professionals in many cyber security and business roles. The Cyber Talk keynotes track  is perfect for C-level executives and other policy makers. Patterned after TED sessions, Cyber Talks bring together top cyber security experts who identify today’s unprecedented security challenges as they discuss cyber security priorities, trends and innovations. The Architect, Prevent and Manage tracks provide the best and most practical ways to secure your organization. Cyber Security engineers, architects, administrators and geeks will benefit greatly from the Customer Community Use Cases track as well as the Technology Innovation and Hands-on Labs to test drive our latest technology.

                  Why should I attend?

                  Understanding the current state of cyber security has never been more important for sustaining normal operations and preventing data breaches that can prove catastrophic to organizations of all types. CPX 360 brings together the world’s elite cyber security experts to give you the latest trends in threats and the strategies and technologies needed to prevent damage from cyber attacks.

                  How do I register?

                  Follow this link to register for the January 21-24 conference to be held at Centara Grand at CentralWorld, Bangkok, Thailand.

                  May I register on-site?

                  No. To ensure sufficient seating for all sessions and events, all attendees must preregister online for the conference.

                  May more than one person from the same company attend the Check Point Experience 360 Conference?

                  Yes, but each person must register individually.

                  Will I receive a receipt for my registration?

                  Yes, you will receive a receipt for your registration from Check Point approximately two weeks after the event.

                  How do I book a hotel room?

                  If you registered for a package that includes a hotel room, Check Point will reserve a hotel room on your behalf for the nights of January 21-23 (for customers) and 21-24 (for partners). A separate hotel confirmation number will be provided to you (this is different from the CPX2019 registration confirmation number you receive). If you chose to register without a hotel room, lodging reservations are wholly your responsibility.

                  Co-op

                  Can I use Co-op funds to attend the event?

                  Yes. If you pre-register for the event pass, partners and distributors can use co-op for this event for each employee and end user that you wish to sponsor excluding hotel.

                  The fee will be directly discounted at the time you or your customer registers. No additional reimbursements apply, so no claims are required in 2019. There is no limit to the number of end user guests that a Check Point partner or distributor can sponsor through Co-op.

                  Can I use co-op to cover conference expenses beyond the approved allowance?

                  No.

                  Do I need to open a co-op project for the approved allowance?

                  No. Please enter the co-op sponsoring partner’s name and email address on the “Preferences” page during online registration so that you get the appropriate allowance.

                  Do I need to file a claim after the event?

                  No. Since no additional reimbursements apply, no claims are required.

                  I have questions about my registration with co-op. How can I follow up?

                  Please contact coop@checkpoint.com.

                  Other Questions

                  What is the dress code?

                  The dress code is business casual.

                  How do I get information on exhibits and sponsorships?

                  Learn more about CPX 360 sponsorship opportunities – contact Demi Battaglia.

                  What if I still have unanswered questions about the Check Point Experience 360 Conference?

                  If you have questions about the conference, please email cpx360.asia@checkpoint.com.

                  What is the Check Point Experience Conference cancellation policy?

                  Conference cancellations received up to two weeks prior to the event are fully refundable. No refunds will be made less than two weeks before the first day of the event. To be eligible for a refund, cancellations must be submitted to cpx360.asia@checkpoint.com. Refunds will be issued within 30 days of the conference.

                  Note: Hotel cancellations are subject to respective hotel cancellation policy.

                  Earn CPE Credits

                  We are pleased to announce that Check Point is partnering with the following world-class cyber security certification vendors to provide CPX 360 attendees the opportunity to gain Continuing Professional Education (CPE) credits.

                  • (ISC)2
                  • GIAC
                  • EC Council
                  • CompTIA


                  How to Obtain CPE Credits

                  • After attending CPX 360, you will receive a digital badge of attendance from Check Point (example shown below)
                    • (ISC)2 – Please send your (ISC)² Member ID# with the badge to CPE@checkpoint.com
                    • GIAC, EC Council, CompTIA – Please visit the certification vendor website and provide them the link to the CPX digital badge as proof of attendance

                  If you have any questions, please contact us at cpe@checkpoint.com.

                  Location

                  • Centara Grand, Bangkok
                  • 999/99 Rama 1 Road, Pathumwan, Bangkok 10330, Thailand
                  • Tel: +66 (0) 2100 1234
                  • Fax: +66 (0) 2100 1235